Analysis
-
max time kernel
84s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:57
Behavioral task
behavioral1
Sample
2b222e58d7e9200bbd669f9b1fbaa220N.exe
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
2b222e58d7e9200bbd669f9b1fbaa220N.exe
-
Size
316KB
-
MD5
2b222e58d7e9200bbd669f9b1fbaa220
-
SHA1
77ccebff0a071645d0b29946ef6ee0ac318529d9
-
SHA256
5ce398dc3c92d2887901d261f3cc8a3799dec76b5537b781557128942a80e835
-
SHA512
0fdb3fd70738013dbc2d3ebd418edd1084c9e51536bd3d1145d1ff5798d7f9fb909fa44d5f3c58407c5b31d2e88774adecab94ddbe04b0ee6b1f46ae8aa33474
-
SSDEEP
1536:64d9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZUnOHBRzU:6IdseIO+EZEyFjEOFqTiQmKnOHjzU
Malware Config
Extracted
Family
neconyd
C2
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
resource yara_rule behavioral1/memory/3012-1-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2872 3012 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b222e58d7e9200bbd669f9b1fbaa220N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2872 3012 2b222e58d7e9200bbd669f9b1fbaa220N.exe 31 PID 3012 wrote to memory of 2872 3012 2b222e58d7e9200bbd669f9b1fbaa220N.exe 31 PID 3012 wrote to memory of 2872 3012 2b222e58d7e9200bbd669f9b1fbaa220N.exe 31 PID 3012 wrote to memory of 2872 3012 2b222e58d7e9200bbd669f9b1fbaa220N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b222e58d7e9200bbd669f9b1fbaa220N.exe"C:\Users\Admin\AppData\Local\Temp\2b222e58d7e9200bbd669f9b1fbaa220N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 362⤵
- Program crash
PID:2872
-